summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2015-07-24Expand ASN.1 template macros - the generated assembly only differs byjsing2-102/+682
changes to line numbers.
2015-07-24an TLS -> a TLS; from thanos tsouanasjmc5-14/+14
2015-07-24Expand ASN1_ITEM_TEMPLATE/ASN1_EX_TEMPLATE_TYPE/ASN1_ITEM_TEMPLATE_ENDjsing8-44/+212
macros - the generated assembly only differs by changes to line numbers.
2015-07-24Expand IMPLEMENT_ASN1_MSTRING macros - the generated assembly only differsjsing4-12/+84
by changes to line numbers.
2015-07-24Convert tls1_process_ticket to CBS.doug4-62/+76
ok miod@ jsing@
2015-07-24Convert tls1_process_sigalgs to CBS.doug2-10/+28
ok miod@ jsing@
2015-07-24Convert ssl3_get_record to CBS.doug2-44/+58
ok miod@ jsing@
2015-07-23call it bcrypt in the man page tootedu1-3/+3
2015-07-23permit "bcrypt" as an alias for "blowfish". this is, after all, whattedu1-11/+27
99% of the world calls it. allow just "bcrypt" without params to mean auto-tune ("bcrypt,a"). default remains 8 rounds (for now) ok deraadt
2015-07-22Revert ca.c r1.7 - BN_to_ASN1_INTEGER() only allocates an ASN.1 integerjsing1-6/+2
when it is not passed a reference to one. In this case, it is passed a reference to an ASN.1 integer that is part of the X509 ASN.1 data structure. Freeing this causes bad things to happen, since it is used and then freed later on. Found the hard way by kinichiro inoguchi.
2015-07-21Convert openssl(1) nseq to new option handling.jsing1-40/+51
ok bcook@ doug@
2015-07-21Convert openssl(1) pkcs7 to new option handling.jsing1-93/+111
ok doug@
2015-07-21remove superfluous strings.hbcook1-2/+1
2015-07-21Remove duplicate check in libssl.doug2-6/+2
If len == 0, it already set try_session_cache so there's no need to check len again. Fixes Coverity issue 21687. ok bcook@
2015-07-20Correct #if/else logic in BIO's dgram_ctrl.doug2-6/+6
Coverity issue 72741 noticed that ret is being overwritten before use. The actual issue is that the #if/else logic is guarding the wrong lines. Besides impacting ret, this also made the case's break logic wrong because it was in the wrong location. ok bcook@ beck@
2015-07-20app_tminterval moved to apps_posix.c, we don't need sys/times.hbcook1-2/+1
2015-07-20prefer string.h to strings.h ok guenther@ doug@bcook2-4/+4
2015-07-20No need to recheck for NULL in openssl(1) ecparam.doug1-5/+1
Fixes Coverity issue 78802. ok bcook@
2015-07-20Don't try to run ECDH if ecdh_checks fails in openssl(1) speed.doug1-17/+23
Coverity 72744 noticed that rsa_count was overwitten. The underlying issue is that this code is supposed to be in an else block. ok bcook@
2015-07-20Avoid NULL deref in openssl(1) s_cb.doug1-5/+14
Fixes Coverity issue 24956. ok bcook@
2015-07-20Avoid possible NULL deref in openssl(1) s_server.doug1-2/+5
Fixes Coverity issue 78873. ok miod@
2015-07-20check the sigbuf value before using it.rpointel1-2/+7
ok miod@ (thanks).
2015-07-20Avoid dereferencing a NULL.doug1-5/+7
Move NULL check before use. Fixes Coverity issue 21746. ok miod@ jsing@
2015-07-20Remove condition that never happens and fix error handling.doug1-6/+5
There were two issues here: 1) in == NULL is never true because it's checked above here. (Fixes Coverity 21705) 2) All error handling is in the if (in == NULL) guard, so effectively there's no error handling and it continues on. ok miod@ jsing@
2015-07-20Various memory leaks upon error or unchecked allocations.miod2-8/+26
ok doug@
2015-07-20Use V_ASN1_UNDEF instead of -1.miod2-14/+14
Make sure ASN1_primitive_new() will return NULL in *pval in all error situations. ok bcook@ doug@
2015-07-20Check the return value of asn1_enc_save(). ok bcook@ doug@miod2-4/+8
2015-07-20When freeing an X509_CRL, if freeing the user-maintained meth_data fails,miod2-6/+8
do not forgot to nevertheless keep freeing the other fields. ok doug@ guenther@
2015-07-20In X509_PKEY_new(), make sure all allocation failures push an error to themiod2-14/+30
error stack, not only the first one. ok guenther@ doug@
2015-07-20add NetLock Kft. CA root certificate, already present in web browsers andsteven1-0/+80
needed for fetching ports distfiles. ok sthen@
2015-07-20Check return value for ENGINE_ctrl and ENGINE_ctrl_cmd.doug1-4/+15
Fixes Coverity issue 21645. ok bcook@
2015-07-20Check return value in openssl(1) s_socket.doug1-3/+6
Fixes Coverity issue 21655. ok bcook@
2015-07-20Remove check that is never true.doug1-3/+1
Fixes coverity issue 78799 as group == NULL was already an error condition above here. ok beck@
2015-07-20Warn when rename() fails in openssl(1) apps.doug1-8/+36
Fixes Coverity issues 78795 and 78803. ok bcook@
2015-07-20Add VIS_DQ to escape double quotes. OK deraadt@ semarie@ reyk@millert1-1/+3
2015-07-19Remove OpenSSL engine RSAX.doug14-1409/+12
OpenSSL stopped building it last year and removed it this year. Based on OpenSSL commit c436e05bdc7f49985a750df64122c960240b3ae1. Also cranked major version in libcrypto, libssl and libtls. "fine with me" bcook@ miod@
2015-07-19Allow *_free() functions in libssl to handle NULL input.doug9-9/+34
This mimics free()'s behavior which makes error handling simpler. ok bcook@ miod@
2015-07-19Drop stupid (int) casts for the arguments of malloc() and friends. This ismiod18-48/+48
not 16-bit MS-DOS anymore. ok bcook@ tedu@
2015-07-19unifdef -UCBC_HANDLES_TRUNCATED_IOmiod2-38/+2
ok bcook@ doug@
2015-07-19Verify ASN1 objects types before attempting to access them as a particularmiod4-4/+12
type. ok guenther@ doug@
2015-07-19tweak previous; ok dougjmc1-4/+4
2015-07-19Convert ssl3_get_certificate_request to CBS.doug2-62/+66
ok miod@
2015-07-19Fix symbol collision with libtls.doug7-36/+36
Pointed out by guenther. ok guenther@
2015-07-19Add TLS_method, TLS_client_method and TLS_server_method.doug9-9/+321
Use these instead of SSLv23_*method when you want to make sure TLS is used. By default, we disable SSLv3 but it's still possible for the user to re-enable it. TLS_*method does not allow SSLv3. Both BoringSSL and (next version of) OpenSSL have these methods. However, they have changed the implementation significantly. We will as well, but not right now. Riding the libssl major bump. ok miod@ bcook@
2015-07-19Crank major and remove legacy variables.doug6-30/+6
Libtls is riding this crank. ok miod@ bcook@
2015-07-19Crank the major of libtls: the behaviour of tls_write() has beenreyk1-1/+1
changed in an incompatible way regarding partial writes. OK miod@ deraadt@
2015-07-19Free memory when finished.doug1-2/+6
Fixes coverity 78835. ok bcook@
2015-07-19Add documentation on how to use TLS_{READ,WRITE}_AGAIN.doug1-2/+29
ok beck@
2015-07-19Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init()miod4-16/+32
fails, check its return value and correctly mop up after ourselves. ok beck@ doug@
2015-07-19Only close descriptor if not already closed.doug1-3/+5
Fixes coverity 78916. ok miod@ bcook@